International Symposium on Algorithms最新文献

筛选
英文 中文
An Analysis of Syndrome Coding 证候编码分析
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_5
Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoojin Chung
{"title":"An Analysis of Syndrome Coding","authors":"Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoojin Chung","doi":"10.1007/978-3-642-13365-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_5","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126293596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication 改进的无线通信安全匿名认证方案
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_19
Muhammad Asif Khan, F. Kausar, A. Masood
{"title":"Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication","authors":"Muhammad Asif Khan, F. Kausar, A. Masood","doi":"10.1007/978-3-642-13365-7_19","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_19","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122101445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MPLS Unleashed: Remedy Using IPSEC over MPLS VPN MPLS释放:通过MPLS VPN使用IPSEC的补救措施
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_24
Syed Noor-ul-Hassan Shirazi, Muhammad Asim, M. Irfan, N. Ikram
{"title":"MPLS Unleashed: Remedy Using IPSEC over MPLS VPN","authors":"Syed Noor-ul-Hassan Shirazi, Muhammad Asim, M. Irfan, N. Ikram","doi":"10.1007/978-3-642-13365-7_24","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_24","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129884151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention 一种新的政府关键系统整体安全方法:防洪
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_25
Mohammed A. Alhabeeb, A. Almuhaideb, P. D. Le, B. Srinivasan
{"title":"A New Holistic Security Approach for Government Critical Systems: Flooding Prevention","authors":"Mohammed A. Alhabeeb, A. Almuhaideb, P. D. Le, B. Srinivasan","doi":"10.1007/978-3-642-13365-7_25","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_25","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128920327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Video Streaming in Vehicular Adhoc Network 车载自组网中视频流的性能评价
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_21
Aneel Rahim, Z. Khan, F. B. Muhaya
{"title":"Performance Evaluation of Video Streaming in Vehicular Adhoc Network","authors":"Aneel Rahim, Z. Khan, F. B. Muhaya","doi":"10.1007/978-3-642-13365-7_21","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_21","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"1974 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intrusion Correlation Using Ontologies and Multi-agent Systems 基于本体和多智能体系统的入侵关联
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_6
G. Isaza, A. Castillo, Marcelo López, L. Castillo, Manuel López
{"title":"Intrusion Correlation Using Ontologies and Multi-agent Systems","authors":"G. Isaza, A. Castillo, Marcelo López, L. Castillo, Manuel López","doi":"10.1007/978-3-642-13365-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_6","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123867718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security Risks of Cloud Computing and Its Emergence as 5th Utility Service 云计算的安全风险及其作为第五大公用事业服务的出现
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_20
Mushtaq Ahmad
{"title":"Security Risks of Cloud Computing and Its Emergence as 5th Utility Service","authors":"Mushtaq Ahmad","doi":"10.1007/978-3-642-13365-7_20","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_20","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116574760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection 面向漏洞检测的知识库语义缺口分析
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_27
R. Wu, Keisuke Seki, Ryusuke Sakamoto, M. Hisada
{"title":"Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection","authors":"R. Wu, Keisuke Seki, Ryusuke Sakamoto, M. Hisada","doi":"10.1007/978-3-642-13365-7_27","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_27","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122222142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pattern Recognition Using Artificial Neural Network: A Review 基于人工神经网络的模式识别研究进展
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_14
Tai-hoon Kim
{"title":"Pattern Recognition Using Artificial Neural Network: A Review","authors":"Tai-hoon Kim","doi":"10.1007/978-3-642-13365-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_14","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network 基于基础设施的无线网状网络中基于接收机的流量控制机制对低容量网络的保护
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_22
Syed Sherjeel A. Gilani, M. Zubair, Z. Khan
{"title":"Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network","authors":"Syed Sherjeel A. Gilani, M. Zubair, Z. Khan","doi":"10.1007/978-3-642-13365-7_22","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_22","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信